Strategic Plan Network Optimization & Transport Services

Size: px
Start display at page:

Download "Strategic Plan Network Optimization & Transport Services 2013-2018"

Transcription

1 Strategic Plan Network Optimization & Transport Services Office of the Chief Information Officer National Oceanic and Atmospheric Administration United States Department of Commerce Version 2.0

2 The NOAA Executive Panel commissioned this Strategic Plan for Network and Transport Services on November 29, The NOAA CIO Council enacted version 2.0 of the plan on June 11, Joseph.F. Klimavicz NOAA Chief Information Officer Director, High Performance Computing & Communications June 14,

3 Table of Contents Overview... 4 Goal 1: Deliver Enterprise Transport Services... 6 Action 1: Manage NOAA s Network at the Enterprise Level... 6 Action 2: Provide Network Services through the IT Service Portfolio... 6 Action 3: Integrate Enterprise-wide Network Operations Centers... 6 Action 4: Align Network Acquisitions to Enterprise Standards... 6 Goal 2: Enhance NOAA s Network Security... 7 Action 1: Route Networks Through TICAPs... 7 Action 2: Improve Security Controls... 7 Action 3: Build a Trusted NOAA Intranet... 7 Action 4: Utilize SOC to Monitor Enterprise Services... 7 Goal 3: Scale Network Capabilities... 8 Action 1: Strategically Acquire Networking Capabilities... 8 Action 2: Improve Network Performance... 8 Action 3: Build Network Engineering Core Competencies... 8 Action 4: Deploy NOAA Enterprise Services for Federal Agency Accessibility... 8 Goal 4: Optimize Network Services... 9 Action 1: Identify Opportunities... 9 Action 2: Enhance Service Delivery... 9 Action 3: Continuously Modernize Enterprise Standards... 9 References

4 Overview In fulfilling its critical mission of science, service, and stewardship, the National Oceanic and Atmospheric Administration (NOAA) generates tremendous value for the Nation and the world by advancing our understanding of, and ability to respond to, changes in the Earth s environment, by improving society s ability to make scientifically informed decisions, and by conserving and managing ocean and coastal resources. i NOAA s mission touches the lives of every American and we are proud of our role in protecting life and property and conserving and protecting natural resources. ii NOAA s mission and operations span all 50 states and international sites, and so rely on having a secure, resilient network infrastructure. Our current networks have grown organically in response to the needs of the Agency. Increased frequency and volumes of observational data gathering, tighter coupling of computational activities, decreased timeframes for product delivery and emergency response, and the exponential growth of environmental data each of these dynamics place more demanding requirements and operational dependencies on NOAA s networks. This document presents a plan to improve NOAA s network acquisition, management and security processes. In order to achieve the overall objectives four goals have been identified: Deliver Enterprise Transport Services, Enhance NOAA s Network Security, Scale Network Capabilities, and Optimize Network Services. Each of these goals will deliver specific benefits to NOAA, and taken as a whole, will represent the transformation of our networks into an enterprise-managed, secure, agile, and reliable resource. The following sections provide details, including the specific actions designed to ensure achievement of the goals, as well as discrete metrics that will be used to measure our progress. Our strategic approach is not intended as a single set of initiatives, but as a recurring series of activities that build, in successive iteration, on the improvements made in the previous cycle. Figure 1: NOAA's Network Optimization Framework 4

5 Table 1: NOAA's Enterprise Network Optimization Strategic Goals, Actions, and Metrics Strategic Goal Implementation Actions Metrics (Timeframes) Deliver Enterprise Transport Services Enhance NOAA s Network Security Scale Network Capabilities Optimize Network Services - Manage NOAA s network at the enterprise level - Provide network services through the IT Service Portfolio - Integrate enterprise-wide NOCs - Align Network Acquisitions to Enterprise Standards - Route networks through TICAPs - Improve security controls - Build a trusted NOAA Intranet - Utilize SOC to monitor enterprise services - Strategically Acquire Networking Capabilities - Improve network performance - Build network engineering core competencies - Deploy NOAA Enterprise Services for Federal Agency Accessibility - Identify opportunities - Enhance service delivery - Continuously modernize enterprise standard - Integrate external NOCs (FY13-14) - Common Configuration Management - Common tools - Build NOAA NOC (FY14-17) - Institute enterprise-level funding (FY16) - Service Portfolio Management (FY13-18) - Complete Enterprise Network Services Standards (FY13-18) - Implement controls to ensure standards conformance (FY 14-18) - Establish Enterprise Network Services Acquisition Vehicles (FY13-14) - Routing through established TICAPS - 50% by end of FY13 - Compliant by end of FY14 - Common NOC security controls: - Security processes (FY13) - Common tools at network edge (FY14-15) - Common tools for enterprise (FY13-18) - Standard templates for ISA&SLA (FY14-18) - Establish Base Trusted Intranet (FY16) - Establish Multi-zone Trusted Intranet (FY17) - SOC monitoring border routers (FY14) - SOC monitoring internal core routers (FY15) - Utilize Strategic Acquisition Vehicles (FY13-18) - Integrate WAN backbones (FY14-18) - Improve networking policy, security, and design engineering core competencies (FY13-18) - Exchange ideas with other Agencies (FY13-18) - Publish Inter-Agency Service Level Agreement for the Enterprise Network Service (FY15) - Modernize network components of the Enterprise Architecture (FY14) - Identify opportunities to reduce cost, improve services or security, or improve performance (FY13-18) - Monitor and integrate industry trends into planning and standards (FY13-18) 5

6 Goal 1: Deliver Enterprise Transport Services Action 1: Manage NOAA s Network at the Enterprise Level By having an accurate and comprehensive understanding of its environment, agency IT leadership will develop realistic operational network goals, implement plans that adhere to operational and security constraints, and will be able to make informed trade-offs among technical, financial, operational, and security considerations. Managing transport services as an enterprise will allow for quicker response to cyber threats, better monitoring, and improved provisioning of services, while providing improved capabilities and costefficiencies. NOAA s Information Services Strategic Plan, iii describes the enterprise information services delivery model NOAA OCIO is moving towards. This model has been designed to achieve a number of benefits, including: cost avoidance; increased efficiencies; economies of scale; improved processes; enhanced enterprise-wide security and networking standards; and improved network services. In order to realize these benefits, the Agency must utilize a common set of services, infrastructure, and funding model. Focus will initially be on external and non-local network connections. As the network service portfolio matures, enterprise standards for management at the local area network level will be developed and implemented. Action 2: Provide Network Services through the IT Service Portfolio To reduce duplicative effort, ensure adherence to policy and standards, and provide greater customer service and support, network services need to be offered through the IT Service Portfolio. As a shared enterprise service itself, the IT Service Portfolio is provided through a standardized infrastructure (consisting of processes and technologies). The result is a familiar, reliable method and set of tools for users across NOAA to identify, select, and configure services they need. Action 3: Integrate Enterprise-wide Network Operations Centers Network Operations Centers (NOCs) are responsible for the oversight, provisioning, monitoring, tuning, reporting, and responding to events on the network. In addition, the NOC will provide a single point of contact for connectivity issues. The NOC will be constituted of a primary and backup center. By the end of FY14, NOAA will establish and implement a common Configuration Management (CM) system, acquisition methodology, service catalog, and shared engineering for the network s border services. By the end of FY17, the Integrated NOC will be responsible for all NOAA networks that are inter-fisma system (or between accreditation boundaries). Action 4: Align Network Acquisitions to Enterprise Standards IT acquisitions need to enable the adoption of enterprise stands. In order to effectively support the operation and evolution of enterprise network services, NOAA s Enterprise Architecture artifacts will accurately reflect the agency s current infrastructure, standards, and technologies, as well as the planned advancement of each. Standards will be documented in the Enterprise Architecture and enforced, a) operationally, through the Configuration Management process and b) strategically, through the system design and acquisition process, IT Investment Authority, and Authorization and Accreditation cyber security processes. 6

7 Goal 2: Enhance NOAA s Network Security Action 1: Route Networks Through TICAPs NOAA has initially established four Trusted Internet Connection Access Providers (TICAPs) iv. In compliance with OMB mandates, NOAA intends to route its external network connections through a TICAP location by the end of FY14. In order to meet our operational requirements for high network availability, NOAA will implement a solution to allow systems to route through multiple TICAPs. Action 2: Improve Security Controls The NOC will provide oversight for the routers on the external border of NOAA s network. Common cyber security controls will be utilized throughout the network infrastructure. NOAA s backbone Wide Area Network (WAN) will maintain controls appropriate for moderate impact systems (as categorized by NOAA, following the NIST FIPS 199 v standard). Business policies, processes, and practices (e.g. centralized logging with the SOC, common authentication methods) will be defined and implemented to ensure that cyber attacks are avoided to the extent feasible. When cyber attacks do occur, the N-CIRT will be engaged to quickly perceive, understand, and contain the situation. As standard templates for Interconnection Security Agreements (ISA), Interface Control Documents (ICD), and Service Level Agreement (SLA) are created, they will be shared to reduce effort and ensure that expectations are appropriately documented. Action 3: Build a Trusted NOAA Intranet Within the intranet, behind the TICAPS, the NOC will provision trusted networks for geographically distributed systems and for sharing information between systems. A multi-level trust model will be designed and implemented, allowing systems and data stores to be designed and implemented with standards for identifying, sharing, merging, analyzing, disseminating, and storing information assets. Action 4: Utilize SOC to Monitor Enterprise Services NOAA s Security Operations Center (SOC) will deploy its monitoring infrastructure to ensure the cybersecurity of the enterprise network and services. The SOC will prescribe counter-measures for ongoing threats. All inter-system border connections will have centralized logging, custom reporting, and active monitoring. NOAA s Homeland Security Program Office will be appropriately updated when there are major events or outages. 7

8 Goal 3: Scale Network Capabilities Action 1: Strategically Acquire Networking Capabilities NOAA will realize the benefits of economies of scale and cost-reduction by employing strategic sourcing initiatives for acquiring network circuits, equipment, and services. Acquisitions will have oversight to ensure observance of enterprise initiatives, security, and procurement objectives. Maintenance and training opportunities will also be combined to reduce cost. NOAA will continue to take advantage of the cost effective capabilities of the N-Wave Science Network and the pre-negotiated bundled services of Federal telecommunication services (e.g. GSA Networx) to provision high-performance networks. To ensure competition during the acquisition process and our quick adoption of new technology, NOAA will embrace open standards within its enterprise network. Standards will be defined for a core set of services, and they will be enforced as requirements during the acquisition process. NOAA is comprised of many small field offices, some medium size offices, and a few large campuses. In addition, NOAA has staff located in partner locations. Solutions will need to be designed and acquired with the flexibility to address the diversity of requirements in a cost-efficient and effective way. Action 2: Improve Network Performance Network infrastructure will be consolidated, when appropriate, and new capabilities will be deployed. Monitoring will be incorporated to check usage and identify constraints. Concurrently, NOAA will improve our network performance by deploying advanced, but proven, technologies, configurations, and operating approaches. Also, standardization of network management tools and performance analyzers to continuously tune the network, adjust configurations and deploy resources to achieve required performance, consistent with cost and security constraints. The network backbone will be designed, constructed, and deployed to accelerate the adoption of new services, keep up with our explosive rate of data growth, and to aid in the data movement related to NOAA s big data challenge. NOAA will leverage National Education and Research Networks (NRENs) for both its internal and external network traffic. They will be utilized, when appropriate, to keep up with the data growth, and to route through TICAPs, for international and other external network traffic including satellite, modeling, and radar. Action 3: Build Network Engineering Core Competencies Network performance and security is limited by the capability of the engineering staff. Building on the skills of the NOAA Network Committee (NNC), NOAA will foster and ongoing technical dialog to maintain an awareness of industry trends and emerging technologies. This will actively support the OCIO s workforce positioning strategy, which includes ongoing training and development of industry best practices across the networking community. Action 4: Deploy NOAA Enterprise Services for Federal Agency Accessibility Enterprise network services will be designed and implemented with the flexibility to be utilized by other Federal Agencies. This will allow other Government Agencies to leverage the improved services and cost advantages derived by NOAA. 8

9 Goal 4: Optimize Network Services Action 1: Identify Opportunities NOAA will regularly explore cost reducing, performance improving, or security enhancing opportunities. The NNC will be responsible for researching and prioritizing these opportunities, and they will be evaluated against mission requirements, enterprise standards and their ability to support special requirements like NOAA s Primary Mission Essential Functions (PMEF). NOAA-wide programs and teams (e.g., NOAA s Web Operations Committee, IT Security Committee) will collaborate on identifying, analyzing, prioritizing, and implementing network improvements. Action 2: Enhance Service Delivery Selected opportunities will be deployed at the enterprise level and documented in the Enterprise Service Catalog. Services will adhere to the Enterprise Architecture and will be authorized through the Configuration Management process. Solution providers will provide monitoring or reporting to either the Security Operations Center or Network Operations Center, as appropriate. Services and infrastructure will be continuously measured, reviewed and evaluated to identify opportunities to restructure or increase efficiencies. Action 3: Continuously Modernize Enterprise Standards NOAA will employ open standards wherever possible. Based upon Agency needs and ongoing market research, the Enterprise Architecture will reflect NOAA s current network standards. The NNC will regularly review NOAA s standards and ensure that they are communicated throughout the Line Offices, that they are integrated into operations and planning, and that they are continuously validated and updated. 9

10 References i National Oceanic and Atmospheric Administration, NOAA s Next Generation Strategic Plan, December 2010, page v. ii National Oceanic and Atmospheric Administration, About NOAA, iii Information Services Strategic Plan, , April 2013 iv Homeland Security, Trusted Internet Connections, v FIPS 199-Standards for Security Categorization of Federal Information and Information Systems, February 2004, Computer Security Division, Information Technology Laboratory, National Institute for Standards and Technology, csrc.nist.gov/publications/fips/fips199/fips-pub-199-final.pdf 10

N-Wave Networking Services Service Catalog

N-Wave Networking Services Service Catalog N-Wave Networking Services Service Catalog Introduction Key Service: N-Wave Network Management Office 1. Key Technical Service: N-Wave Science Network 2. Key Technical Service: Network Operations Center

More information

Contents. A Message from the CIO... iii. Introduction... 1. Improve Information Services... 6

Contents. A Message from the CIO... iii. Introduction... 1. Improve Information Services... 6 i Contents A Message from the CIO... iii Introduction... 1 Improve Information Services... 6 Improve Efficiency of Delivering Information Services... 10 Protect the Mission... 13 Position the Information

More information

FY14 Q2 Chief Information Officer Federal Information Security Management Act Reporting Metrics v1.0

FY14 Q2 Chief Information Officer Federal Information Security Management Act Reporting Metrics v1.0 FY14 Q2 Chief Information Officer Federal Information Security Management Act Reporting Metrics v1.0 Prepared by: US Department of Homeland Security Office of Cybersecurity and Communications Federal Network

More information

N-WaveNews. From the N-Wave Operations Manager. this issue

N-WaveNews. From the N-Wave Operations Manager. this issue ISSUE 03 April 2014 N-WaveNews this issue From the N-Wave Operations Manager P.1 N-Wave Network and Performance Metrics P.2 N-Wave NOC Tickets Report P.4 NOAA N-Wave N-Wave is NOAA s science network. Built

More information

Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development

Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January 2014. PPM Project Type Custom Development Project Planning and Management (PPM) V2.0 Project Type Guide Custom Development Version 1.1 January 2014 Last Revision: 1/22/2014 Page 1 Project Type Guide Summary: Custom Development Custom software

More information

December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments

December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments

More information

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/. Department of Commerce $ National Oceanic & Atmospheric Administration $ National Weather Service NATIONAL WEATHER SERVICE POLICY DIRECTIVE 80-3 October 28, 2009 Science and Technology SYSTEMS ENGINEERING

More information

Statement of Dr. Simon Szykman, Chief Information Officer U.S. Department of Commerce

Statement of Dr. Simon Szykman, Chief Information Officer U.S. Department of Commerce Statement of Dr. Simon Szykman, Chief Information Officer U.S. Department of Commerce Before the Committee on Homeland Security and Governmental Affairs of the United States Senate on Reducing Duplication

More information

How To Improve Federal Network Security

How To Improve Federal Network Security Department of Federal Network Trusted Internet Connections (TIC) Update for the Information and Privacy Advisory Board July 29, 2009 Federal Network (FNS) Federal Network Branch Branch Vision: To be the

More information

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information

More information

BPA Policy 434-1 Cyber Security Program

BPA Policy 434-1 Cyber Security Program B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy

More information

Overview. FedRAMP CONOPS

Overview. FedRAMP CONOPS Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

DEPARTMENTAL REGULATION

DEPARTMENTAL REGULATION U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information

More information

The Future of Census Bureau Operations

The Future of Census Bureau Operations The Future of Census Bureau Operations Version 1.0 April 25, 2013 The Future of Census Bureau Operations Page ii [This page intentionally left blank] The Future of Census Bureau Operations Page iii Document

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business

More information

NASA OFFICE OF INSPECTOR GENERAL

NASA OFFICE OF INSPECTOR GENERAL NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)

More information

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/. Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-703 23 April 2013 Information Technology IT Security VULNERABILITY

More information

Strategic Vision. for Stewarding the Nation s Climate Data. Our. NOAA s National Climatic Data Center

Strategic Vision. for Stewarding the Nation s Climate Data. Our. NOAA s National Climatic Data Center Strategic Vision Our for Stewarding the Nation s Climate Data NOAA s National Climatic Data Center M AY 2013 Our Strategic Vision for Stewarding the Nation s Climate Data 2 FOREWORD From the Director The

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

NOAALink Small Business Industry Day. June 2, 2014

NOAALink Small Business Industry Day. June 2, 2014 NOAALink Small Business Industry Day June 2, 2014 1 Administrative Notes Restrooms are through the double doors at the rear of the Science Center Attendee list, slide deck, and Q&A will be posted to FBO.gov

More information

Managed Enterprise Internet and Security Services

Managed Enterprise Internet and Security Services Managed Enterprise Internet and Security Services NOMINATING CATEGORY: CYBER SECURITY INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF INFORMATION OFFICER COMMONWEALTH OF PENNSYLVANIA FINANCE BUILDING HARRISBURG,

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

More information

Information System Security Officer (ISSO) Guide

Information System Security Officer (ISSO) Guide Information System Security Officer (ISSO) Guide Office of the Chief Information Security Officer Version 10 September 16, 2013 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM

More information

U.S. Nuclear Regulatory Commission

U.S. Nuclear Regulatory Commission U.S. Nuclear Regulatory Commission 2011 Data Center Consolidation Plan and Progress Report Version 2.0 September 30, 2011 Enclosure Contents 1 Introduction... 2 2 Agency Goals for Data Center Consolidation...

More information

United States Department of Health & Human Services Enterprise Architecture Program Management Office. HHS Enterprise Architecture Governance Plan

United States Department of Health & Human Services Enterprise Architecture Program Management Office. HHS Enterprise Architecture Governance Plan United States Department of Health & Human Services Enterprise Architecture Program Management Office HHS Enterprise Architecture Governance Plan Version 3.0 February 2007 Approvals The Health and Human

More information

COMMONWEALTH OF MASSACHUSETTS

COMMONWEALTH OF MASSACHUSETTS COMMONWEALTH OF MASSACHUSETTS Implementation Roadmap February 2003 February 2003 Page 165 of 191 February 2003 Page 166 of 191 A. INTRODUCTION The findings and recommendations of the Enterprise IT Strategy

More information

State of Montana Strategic Plan for Information Technology 2014

State of Montana Strategic Plan for Information Technology 2014 State of Montana Strategic Plan for Information Technology 2014 This document is prepared under the authority of the Montana Information Technology Act of 2001. It is published biennially unless special

More information

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/. Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities

More information

Agency for State Technology

Agency for State Technology Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief

More information

Federal Data Center Consolidation Initiative

Federal Data Center Consolidation Initiative Federal Data Center Consolidation Initiative United States Agency for International Development (USAID) 2011 Data Center Consolidation Plan & Progress Report September 30, 2011 1 Introduction...2 2 Agency

More information

DHS IT Successes. Rationalizing Our IT Infrastructure

DHS IT Successes. Rationalizing Our IT Infrastructure TESTIMONY OF Richard A. Spires Chief Information Officer U.S. Department of Homeland Security Before the House Committee on Oversight and Government Reform February 27, 2013 Chairman Issa, Ranking Member

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE

More information

PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM

PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION

More information

Appendix 3 Disaster Recovery Plan

Appendix 3 Disaster Recovery Plan Appendix 3 Disaster Recovery Plan December 13, 2006 Revision XXQwest Government Services, Inc. 4250 North Fairfax DriveArlington, VA 22203(Delete this page)revision history Revision Number Revision Date

More information

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement

More information

Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028)

Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028) MEMORANDUM FOR KATHERINE ARCHULETA Director FROM: SUBJECT: PATRICK E. McFARLAND Inspector General Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028) The purpose of this memorandum

More information

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/. Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 30-1203 JANUARY 23, 2012 Maintenance, Logistics, and Facilities Configuration

More information

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent Cloud Security A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud Sean Curry Sales Executive, Aquilent The first in a series of audits DoD did not fully execute elements of the July 2012

More information

DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES

DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans

More information

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE

More information

2) trusted network, resilient against large scale Denial of Service attacks

2) trusted network, resilient against large scale Denial of Service attacks Sam Crooks Network Design Engineer My background is that I have worked in the gaming (as in casinos, gambling), credit card processing industries, consumer credit and related

More information

Computer Network Security & Privacy Protection

Computer Network Security & Privacy Protection Overview Computer Network Security & Privacy Protection The Nation s electronic information infrastructure is vital to the functioning of the Government as well as maintaining the Nation s economy and

More information

NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS

NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS MARCH 18, 2013 AUDIT REPORT OFFICE OF AUDITS NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration

More information

Manag. Roles. Novemb. ber 20122

Manag. Roles. Novemb. ber 20122 Information Technology Manag gement Framework Roles and Respo onsibilities Version 1.2 Novemb ber 20122 ITM Roles and Version History Version ed By Revision Date Approved By Approval Date Description of

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Small Business. Leveraging SBA IT resources to support America s small businesses

Small Business. Leveraging SBA IT resources to support America s small businesses Small Business Administration Information Technology Strategic Plan ( ITSP) 2012-2016 Leveraging SBA IT resources to support America s small businesses Message from the Chief Information Officer The Small

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

Nuclear Regulatory Commission Computer Security Office CSO Office Instruction

Nuclear Regulatory Commission Computer Security Office CSO Office Instruction Nuclear Regulatory Commission Computer Security Office CSO Office Instruction Office Instruction: Office Instruction Title: CSO-PLAN-0100 Enterprise Risk Management Program Plan Revision Number: 1.0 Effective

More information

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Whitepaper: 7 Steps to Developing a Cloud Security Plan Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for

More information

CITY OF HOUSTON. Executive Order. Information Technology (IT) Governance

CITY OF HOUSTON. Executive Order. Information Technology (IT) Governance CITY OF HOUSTON Executive Order E.O. No: 1-44 Effective Date: December 20, 2012 1. AUTHORITY 1.1 Article VI, Section 7a, of the City Charter of the City of Houston. 2. PURPOSE 2.1 The City of Houston seeks

More information

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

Standards for Security Categorization of Federal Information and Information Systems

Standards for Security Categorization of Federal Information and Information Systems FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology

More information

5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT

5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT 5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT (CT:IM-92; 08-01-2007) (Office of Origin: IRM/BPC/PRG) 5 FAM 671 WHAT ARE IT PERFORMANCE MEASURES AND WHY ARE THEY REQUIRED?

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security. Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency

More information

Security Controls Assessment for Federal Information Systems

Security Controls Assessment for Federal Information Systems Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology

More information

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen

More information

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Federal Acquisition Service

Federal Acquisition Service Federal Acquisition Service Network Services Programs Lessons Learned Network Services Programs Integrated Technology Services Federal Acquisi>on Service General Services Administra>on Introduction and

More information

WAN Migration Techniques

WAN Migration Techniques Jan 2014, HAPPIEST MINDS TECHNOLOGIES WAN Migration Techniques Lalit Kumar SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. 2 Copyright Information This document is exclusive property

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY

More information

STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES

STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES STATEMENT OF MARK A. FORMAN ASSOCIATE DIRECTOR FOR INFORMATION TECHNOLOGY AND ELECTRONIC GOVERNMENT OFFICE OF MANAGEMENT AND BUDGET BEFORE THE COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash

Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Introduction Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need

More information

How To Save Money On A Data Center

How To Save Money On A Data Center Federal Data Center Consolidation Initiative Data Center Consolidation Plan for the U.S. Small Business Administration Maintained by: The Office of the Chief Information Officer Paul Christy, CIO Revised:

More information

Migrating and consolidating even the simplest of data

Migrating and consolidating even the simplest of data CALIBRE An Employee-Owned Management and Technology Services Company 6354 Walker Lane, Suite 300, Metro Park Alexandria, Virginia 22310-3252 USA p. 703.797.8500 or 1.888.CALIBRE international p. 011.1.888.CALIBRE

More information

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO Introduction Since taking office in January 2015, Governor Larry Hogan has

More information

Information Resource Management Directive 5000.05 USAP Information Security Architecture

Information Resource Management Directive 5000.05 USAP Information Security Architecture The National Science Foundation Polar Programs United States Antarctic Program Information Resource Management Directive 5000.05 USAP Information Security Architecture Organizational Function Information

More information

April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)

More information

U.S. Department of Housing and Urban Development Data Center Consolidation Plan

U.S. Department of Housing and Urban Development Data Center Consolidation Plan U.S. Department of Housing and Urban Development Data Center Consolidation Plan FY12 Final Plan September 30, 2011 1 P a g e TABLE OF CONTENTS DOCUMENT INFORMATION TABLE OF CONTENTS... 2 TABLE of TABLES...

More information

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher

More information

INTERNATIONAL TRADE ADMINISTRATION Improvements Are Needed to Strengthen ITA s Information Technology Security Program

INTERNATIONAL TRADE ADMINISTRATION Improvements Are Needed to Strengthen ITA s Information Technology Security Program INTERNATIONAL TRADE ADMINISTRATION Improvements Are Needed to Strengthen ITA s Information Technology Security Program FINAL REPORT NO. OIG-12-037-A SEPTEMBER 27, 2012 U.S. Department of Commerce Office

More information

Modeling and Simulation (M&S) for Homeland Security

Modeling and Simulation (M&S) for Homeland Security Modeling and Simulation (M&S) for Homeland Security Dr. Charles Hutchings Deputy Director, Modeling and Simulation Test and Standards Division Science and Technology Directorate June 23, 2008 Outline How

More information

Enhance State IT Contract Expertise

Enhance State IT Contract Expertise Enhance State IT Contract Expertise Chris Estes State Chief Information Officer Office of Information Technology Services March 2015 1 P a g e Table of Contents 1. Legislative Request... 3 2. Introduction...

More information

The rise of the hybrid network model

The rise of the hybrid network model The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks

More information

IT Governance Overview

IT Governance Overview IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope

More information

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy

More information

IBM Software Cloud service delivery and management

IBM Software Cloud service delivery and management IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,

More information

Managing Security and Privacy Risk in Healthcare Applications

Managing Security and Privacy Risk in Healthcare Applications Managing Security and Privacy Risk in Healthcare Applications 5 th Annual OCR / NIST HIPAA Security Rule Conference June 6, 2012 Dr. Ron Ross Computer Security Division Information Technology Laboratory

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen

More information

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

More information

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0

Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0 U.S DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM CYBER SECURITY STRATEGIC PLAN FEBRUARY 12, 2007 Table of Contents INTRODUCTION... 4 CYBER SECURITY STRATEGY OVERVIEW... 5 CYBER SECURITY VISION AND MISSION...

More information

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES

More information

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES

More information

How To Support High Performance Computing

How To Support High Performance Computing 1 of 12 One Hundred Second Congress of the United States of America AT THE FIRST SESSION Begun and held at the City of Washington on Thursday, the third day of January, one thousand nine hundred and ninety-one

More information

Delivering Cost Effective IT Services

Delivering Cost Effective IT Services M2 Technology Delivering Cost Effective IT Services Defense agencies have been directed to move towards cloud and shared service models by the Federal Data Center Consolidation Initiative (FDCCI), the

More information

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1:

More information

WHITE PAPER. Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness

WHITE PAPER. Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness WHITE PAPER Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness Traditionally, organizations have leveraged project-based models for performance testing.

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

Appropr iated Accounts Department-wide Systems and Capital Investment Program

Appropr iated Accounts Department-wide Systems and Capital Investment Program Department-wide Systems and Capital Investment Program Mission: To modernize business processes and increase efficiencies throughout the Department of Treasury through technology investments. Program Summary

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information